Video Screencast Help
Symantec to Separate Into Two Focused, Industry-Leading Technology Companies. Learn more.
Security Community Blog
Showing posts in English
linda_park | 17 Jun 2014 | 2 comments

Organizations are spending more on security and believe they’re adequately protected, yet data breaches continue to impact consumers, businesses and governments – the number of breaches jumped 62 percent in 2013. Overworked and understaffed, security teams are stitching together “good enough” security point products that weren’t designed to work together. Not only does this make you more vulnerable to breaches, but it also increases operational complexity.

Symantec Data Loss Prevention 12.5 introduces new features that give you greater control over your confidential data and simplify the management of DLP including:

  1. NEW! Single Server Installation support enables you to deploy the DLP detection servers, Enforce Platform, and Oracle database on a single physical server for branch offices or small organizations (1,000 users or less), and lowers hardware and maintenance costs.
  2. NEW! Self-Service Remediation...
srolleycsc | 13 Jun 2014 | 0 comments

Ive just come off 'Gigya's' latest Webinar about the power of social login for marketing.  You know, when you go to a website and your asked to create an account but you also have the option to simply join by using your facebook account.  Well there is a big problem with this and its not going to be long before hackers are all over it.  People dont realise that when they hit the 'login with facebook' account of whats actually happening and even for a professional its difficult to determine.


The issue is that the social login window is often sized very small and is not sizeable and you cant see the address its pointing at, so it might offer a fake one first, collect your login and password, say there was an error and ask you to try again, then offer you the real one and let you in so you dont think youve been conned.  People do this dozens of times per week and just trust that the little box is really connecting to facebook.  Invariably...

jjesse | 12 Jun 2014 | 0 comments

Symantec Data Insight (DI) can help customers who struggle with identifying data users and owners for their unstructured data.  DI helps a customer answer the following questions:

  1. Who owns the data?
  2. Who is responsible for remediation of that data?
  3. Who has seen the data?
  4. Who has access to the data?
  5. What data is most at-risk?



So what's new in Data Insight 4.5?  Here are 4.5 (get it?) awesome things about this release:


  1. Self-service portal to make remediation easier:  A portal that allows data owners and/or custodians of data to be able to remediate items directly potentially without the need for IT Security.  Actions can come from either the Data Loss Prevention (DLP) Portal or from Data Insight Management Server depending on the workflow.  

            A customer can create...

Wui Wui Yu | 03 Jun 2014 | 0 comments

On 28 May 2014, 56 security professionals from the public and private sectors took up the Cyber Readiness Challenge in Malaysia.

The exciting four-hour interactive competition to capture the most flags provides a rare opportunity for the participants to put their security knowledge in action, sharpen their skills and compete against their peers through a cyber game.

Here are some photos of the participants in action during the intense competition:

CRC Malaysia - 1.png

The inaugural competition in Malaysia is designed for all levels of technical expertise and puts participants in the role of a cyber attacker seeking to infiltrate and exploit an organisation. It consists of a five-step Advanced Persistent Threat (APT) scenario which include reconnaissance, incursion, discovery, capture and exfiltration.

"The competition helps participants to understand the...

The Conquistador | 22 May 2014 | 0 comments

Every now and then I come across infections that are not picked up by SEP, or they happen to be picked up by SEP, but they only register "newly infected" or "Still infected"
The worst thing about these types of infections is there is not much on the surface. Some malware will stand out at you and pretty much tell you, "HEY YOU ARE INFECTED" by running it's own "level of protection" This will prevent you from running other programs or even accessing the internet to get files that can be beneficial in cleaning out this mess.

I have noticed that whenever things like this occur, I have to either google and/or download different parts of programs even though I already have an AV Program installed. One of the things I do is download MalwareBytes Anti Malware and the Norton Power eraser. These have been the two most powerful tools I have had in cleaning up infected files.
Once run, I am able to make great progress and get a PC/Server back on track....

Chetan Savade | 21 May 2014 | 1 comment


PowerShell script to validate that all machines in your OU have Symantec Endpoint Protection (SEP) anti-virus client installed and started. Generates a color-coded Excel report highlighting problematic nodes.

Refer this link and download the script from here:

Reference link:

Note: This method is not supported by Symantec. Symantec recommends to use unmanaged detector.

Tim G. | 19 May 2014 | 0 comments

So I was reading this article earlier and I had some thoughts come to mind here.  I was going to share them on my LinkedIn account, but felt that this was not going to be a short update, nor would it be a "final thought" as I would like to have something with a little more meat and feedback to it.

So here goes.

In the article the author calls out some pretty interesting stats associated with credit card breaches, PII losses and the like.  None of these details should be news to you if you follow any of Symantec's reports like the ISTR or any other of our joint reports or other industry bodies’ reports for that matter. 

These reports will show you big numbers, which really show just how prevalent and dangerous all of this is.  And to be quite...

nisharamach | 18 May 2014 | 0 comments

Join Symantec Security Response expert, Kevin Haley, for a Tweet Chat on Friday, May 23 at 11 a.m. PT / 2 p.m. ET to talk about  key trends highlighted in Symantec’s recent Internet Security Threat Report (ISTR), Volume 19.

The ISTR, which covers the major threat trends observed by Symantec in 2013, highlights how cybercriminals unleashed the most damaging series of cyberattacks in history – ushering in the era of the “Mega Breach.”

How do these breaches impact you and your company? Find out. Mark your calendars to join the #ISTRTALK chat and plan to discuss the latest attack vectors and techniques used by cybercriminals to gain access to your data.

Topic: Internet Security Threat Report: Volume 19 – What are the odds of your company getting attacked?

Date: Friday May 23, 2014

Time: Starts...

vgtero | 05 May 2014 | 0 comments

Symantec Vision 2014 has finally arrived and we are excited to welcome all of our attendees! This week’s event offers four days of face-to-face insights, information, and experiences you can use to secure your organization.   

On Wednesday, May 7, we are offering a hands-on lab session to highlight the new capabilities of Symantec Control Compliance Suite Standards Manager 11.0.5, which started shipping on April 15, 2014.   Lab 1381- Enhance Asset Discovery and SCAP 1.2 Compliance for Continuous Monitoring with CCS Standards Manager, will demonstrate how CCS Standards Manager's new network and asset discovery capabilities and SCAP 1.2 support enhances your continuous monitoring objectives. (Lab 1381, Wednesday, May 7, 2-3 pm, Milano 1). 

Control Compliance Suite...

khaley | 05 May 2014 | 1 comment

Hear the word flimflam and you think of a time of straw hats and cardboard suitcases; of grifters pulling into town to take the rubes with patent medicine, three-card monte and the old pigeon drop con.

It would be nice to think that these words don’t get used today because we’ve become so much smarter.  We have information at our finger tips.  We are too smart and sophisticated for flimflam, grifts, ruses, hustles, swindles or bunko to work on us. 

Of course that’s not true.  Words just fall out of fashion.  Today we call them scams and cons.  And while we might be more sophisticated than we were, we remain human and human nature remains just as exploitable as it was a hundred years ago.   Oh, and the Flimflammers have gotten more sophisticated too. They’re now using computers.

Using the Internet to run scams makes sense.  Con is short for confidence.  And where better to gain confidence than among friends and...